General
-
Target
jonathanfrith.co.document.12.23.2022.docm
-
Size
1.3MB
-
Sample
221224-wlw43sde7s
-
MD5
1fd26f7168cef61ecfa03cbd2a9c7eec
-
SHA1
818a19cdc8a28151083dd201cea5ebec0355a3fa
-
SHA256
fcadf8c50d8b114cabd4509452b1a4f24f28f5b439179cae610dc037727d2077
-
SHA512
7d90730e21fb2489d9cf71b127f9fc17b5275b2f4f6fda0cbe85eb707d9130851f29cbe7747808e1a79e2b99ea6343ee525cf78c11ff6f1d44039cccd72882ba
-
SSDEEP
24576://JpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmcq:/xpJmgf3zliFppVKqG+K
Behavioral task
behavioral1
Sample
jonathanfrith.co.document.12.23.2022.docm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
jonathanfrith.co.document.12.23.2022.docm
Resource
win10v2004-20220812-en
Malware Config
Extracted
icedid
1212497363
Extracted
icedid
1212497363
trbiriumpa.com
Targets
-
-
Target
jonathanfrith.co.document.12.23.2022.docm
-
Size
1.3MB
-
MD5
1fd26f7168cef61ecfa03cbd2a9c7eec
-
SHA1
818a19cdc8a28151083dd201cea5ebec0355a3fa
-
SHA256
fcadf8c50d8b114cabd4509452b1a4f24f28f5b439179cae610dc037727d2077
-
SHA512
7d90730e21fb2489d9cf71b127f9fc17b5275b2f4f6fda0cbe85eb707d9130851f29cbe7747808e1a79e2b99ea6343ee525cf78c11ff6f1d44039cccd72882ba
-
SSDEEP
24576://JpJmLOgHWi8bj11H2w5inpF7sONo/qiy7L9pvRDuG7EzqHm+Bmcq:/xpJmgf3zliFppVKqG+K
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-